Guide to the Forensic Process

  • Acquire -  Our analysts are skilled in the proper forensic acquisition of data from servers, desktops, laptops and smartphones (including iPhones, Blackberrys and Android based devices). Additionally, a critical element at the outset of any computer forensic investigation is the establishment of the chain of custody. Being able to account for the whereabouts device or data and who has handled it, is necessary in the course of establishing the data as defacto evidentiary material. Media can include hard drives, CD and DVD disks, memory sticks, external USB drives and backup tapes to name a few.

  • Authenticate - Verification of the data obtained is important in order to prove that the data is authentic from its source.  Failure to do so could prove detrimental to the matter later in the process, especially if litigation is involved or expected.

  • Analyze - Careful analysis of the data takes place to extract evidence of wrongdoing.  Using state of the art tools allows us to find pieces of information that one would think would be long gone.

  • Reporting - Reporting can take several forms. We compile our results and present them to you in a complete and concise format, and can subsequently present testimony in a deposition or live trial. 

  • Archiving - A perfect forensic image is retained at our secured facility for future use, whether it is new information coming to light in an investigation or a civil matter going to trial several years after filing.

For additional information or to discuss your specific needs, contact Ted Swailes at 713-361-5222 or via email.